• 0 Posts
  • 16 Comments
Joined 1 year ago
cake
Cake day: July 20th, 2023

help-circle







  • Some people like to rag onto Canonicals bad decisions. These include:

    1. Putting ads in the terminal
    2. Use of Affiliate links in the DE
    3. The forceful use of Snap
    4. The proprietary Snap infrastructure
    5. The feeling of being abandoned, in favour of the server market (lack of desktop innovation)
    6. Lens search, that allows company (eg: Amazon) tracking.
    7. Anti-privacy settings enabled, by default.



  • Games that just come out could be an issue regardless of distro. Sometimes Wine/Proton needs to fix a few things… no distro is going to help, in that regard. I suppose a more regularly updated distro COULD help with getting updates faster… but it’s usually nothing you cannot already solve with Pop. ProtonUp-QT is a great tool to help get you the latest Proton versions, including the Eggroll fork. It’s available as a Flatpak, so it’ll work on most modern distros (including Pop).

    If you must switch to a more regularly updated distro, you have a couple of options. Nobara (based on Fedora) will give you a nice middle ground between your current setup and Arch. Speaking of which, Arch is a great distribution, with fantastic documentation. That being said, it IS NOT new user friendly. It WILL break, and you WILL need to look stuff up. You’re on the literal bleeding edge, of Linux. The Arch forums can also be quite toxic, in comparison to what’s available on both Pop/Ubuntu and Nobara/Fedora. If neither is appealing to you, consider OpenSUSE Tumbleweed. It’s very up to date, but I often find it more stable than Arch.


  • It’s a great option, but it’s debatable whether or not it’s privacy improving. On one hand it’s your domain. You don’t need to worry about moving email services, and as you control it, you can have as many addresses as you want. One for each service, catch all, and so on. On the other hand it’s YOUR domain. Only you have access to it. It’s quite easy to filter out the first part, before the @ sign, and identify exactly who you are. It’s a unique data point, tied to you. It’s arguably as bad as handing out a phone number.


  • Depending on your threat model, consider printing them out. You’ll have a physical copy of your keys, not tied to any electrical good. Even if they get stolen, they’re not usable, due to them not knowing your password.

    Alternatively keep a digital pdf, or txt document with them inisdie. Save that document on a a USB drive or SD card. You could save it on your phone, but it’s best to keep your backup codes away from your normal 2FA codes.